Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15577: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Valmet Valmet DNA Web Tools

0
High
VulnerabilityCVE-2025-15577cvecve-2025-15577cwe-22
Published: Thu Feb 12 2026 (02/12/2026, 06:04:56 UTC)
Source: CVE Database V5
Vendor/Project: Valmet
Product: Valmet DNA Web Tools

Description

CVE-2025-15577 is a high-severity path traversal vulnerability in Valmet DNA Web Tools (version C2022 and older) that allows unauthenticated attackers to read arbitrary files by manipulating URL paths. This vulnerability does not require authentication or user interaction, making exploitation straightforward over the network. The flaw arises from improper limitation of pathname inputs, enabling attackers to access sensitive files outside intended directories. Although no known exploits are reported in the wild yet, the vulnerability’s high CVSS score (8. 7) indicates significant risk to confidentiality. European organizations using Valmet DNA Web Tools, especially in critical infrastructure sectors, face potential data exposure and operational risks. Mitigation requires immediate patching once available, strict input validation, and network-level access controls to restrict exposure. Countries with substantial industrial automation and energy sectors, such as Finland, Germany, and France, are most likely to be affected. Defenders should prioritize monitoring for suspicious URL requests and limit external access to affected systems until patched.

AI-Powered Analysis

AILast updated: 02/12/2026, 08:03:36 UTC

Technical Analysis

CVE-2025-15577 is a path traversal vulnerability classified under CWE-22 affecting Valmet DNA Web Tools, specifically versions C2022 and older. The vulnerability enables an unauthenticated attacker to manipulate URL parameters to traverse directories and read arbitrary files on the server. This occurs due to insufficient validation and improper restriction of pathname inputs, allowing attackers to escape the intended directory boundaries. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is primarily on confidentiality, as attackers can access sensitive files, potentially including configuration files, credentials, or other critical data. The vulnerability does not affect integrity or availability directly but could facilitate further attacks if sensitive information is disclosed. No patches or exploit code are currently publicly available, but the vulnerability is published and should be considered exploitable given its characteristics. The vulnerability affects Valmet DNA Web Tools, a product used in industrial automation and process control environments, which are critical for sectors like energy, manufacturing, and utilities. The improper pathname limitation flaw means that URL inputs are not sanitized or validated to restrict file access within a safe directory, enabling directory traversal attacks. This type of vulnerability is particularly dangerous in web tools exposed to untrusted networks, as it allows attackers to bypass authentication and access internal files.

Potential Impact

For European organizations, especially those in industrial automation, energy production, and critical infrastructure sectors, this vulnerability poses a significant risk of unauthorized disclosure of sensitive information. Attackers could gain access to configuration files, credentials, or proprietary data, potentially leading to further compromise or operational disruption. The exposure of sensitive files could facilitate espionage, sabotage, or compliance violations under GDPR if personal or operational data is leaked. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely, increasing the attack surface. Organizations relying on Valmet DNA Web Tools may face reputational damage, regulatory penalties, and operational risks if attackers leverage this vulnerability. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly. The impact on availability and integrity is limited but indirect risks exist if attackers use disclosed information for subsequent attacks.

Mitigation Recommendations

1. Immediately restrict network access to Valmet DNA Web Tools interfaces, especially from untrusted or external networks, using firewalls or VPNs. 2. Implement strict input validation and sanitization on URL parameters to ensure pathname inputs cannot traverse directories outside intended boundaries. 3. Monitor web server logs for suspicious URL patterns indicative of directory traversal attempts (e.g., ../ sequences). 4. Deploy Web Application Firewalls (WAFs) with rules to detect and block path traversal payloads targeting Valmet DNA Web Tools. 5. Coordinate with Valmet for timely patch releases and apply security updates as soon as they become available. 6. Conduct internal audits to identify and isolate affected systems, ensuring they are segmented from critical networks until patched. 7. Educate operational technology (OT) and IT security teams about this vulnerability and the importance of layered defenses. 8. Consider implementing file integrity monitoring on critical systems to detect unauthorized file access or changes. 9. Review and tighten access controls on sensitive files and directories to minimize exposure even if traversal is attempted.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
NCSC-FI
Date Reserved
2026-02-11T07:10:54.573Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698d860cc9e1ff5ad8a5a414

Added to database: 2/12/2026, 7:49:32 AM

Last enriched: 2/12/2026, 8:03:36 AM

Last updated: 2/12/2026, 11:04:11 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats